Category Archive

Though high-profile assaults on huge corporations or well-known web platforms grab the most attention when they make the news, cyber-criminals are at work at all levels – from attacks on private individuals, to attempts made on businesses and organizations of all types and sizes. In recent times, they’ve met with increasing success, resulting in huge personal and corporate losses in … Read More

Since information has become the life’s blood and major currency of the digital economy, it’s essential that measures should be taken to ensure that data flows smoothly between those who create it, and those who are meant to receive it. This is particularly true of the internet, which is the world’s major transport medium for digital information and content of … Read More

The General Data Protection Regulation or GDPR (Regulation (EU) 2016/679) was created by lawmakers in the European Union (EU) as a means of strengthening privacy protection and upholding the rights to personal information of consumers in the European continent. There’s a lot of speculation – and a fair amount of scrambling to get things put in place – as the … Read More

If you’re a smartphone user, you’ll probably find that the little mobile device not only remains with you for the larger part of each day but that it also plays some kind of a role in practically every aspect of your daily life. Whether that simply means checking the time or checking in with your social media and messaging services … Read More

Gone are the days when vehicular transport simply meant four wheels, an internal combustion engine, two or more doors, and a solid roof (if you were lucky). Cars, trucks, and buses of the digital age typically carry around 40 microprocessors and dozens of electronic sensors to regulate their functions and monitor performance. And like other mechanisms and appliances which incorporate … Read More

2018 has just begun – and already we’ve seen the year’s first major cyber-security crisis. It concerns two vulnerabilities with the capacity to affect the majority of computers, smartphones, laptops, and tablets developed since 2011 – and it’s got individual citizens and businesses (including some of the world’s most heavyweight commercial organizations) scrambling to make sense of the issues, and … Read More

Security and business IT professionals are pretty much in agreement that it’s impossible for commercial organizations to completely avoid being hit by some form of cyber-attack or security breach – either as a future event or an incident that’s already occurred. While planning, policy-making, and the deployment of security mechanisms, devices, and protocols may offer some relief, the inevitability of … Read More

The traditional model of network security relies on the establishment of a secure boundary, or perimeter. This not only keeps unwanted “visitors” or attackers out but also assumes that those who remain within the boundary are only authorized users of the system. These authorized users may then be trusted only to access the network resources that have been allocated to … Read More

Just as in the physical world, we leave traces of ourselves – fingerprints, hairs, clothing fibers, DNA, etc. – when we move and interact with people, places, and objects, so too do activities in the digital realm leave pieces or echoes of themselves. These virtual or digital traces – think file fragments, activity logs, timestamps, metadata, and so on – … Read More

Though its reputation has taken a battering in recent months over allegations of involvement in long-term spying or extreme surveillance operations conducted against agencies of the U.S. government, the Russia-based security firm Kaspersky Lab has recently made the news for more positive reasons. Researchers at Kaspersky have discovered a Trojan named Loapi – a resourceful and potentially deadly piece of … Read More